Archive for April, 2010

Hard like Heroic

Parody of  “Bad touch” From The Bloodhound Gang


I wasn’t going to write about this because it’s everywhere but it’s finally getting under my nerves.
So a random Apple Employee “Accidently” left an Iphone 4g Prototype on a barstool. A guy found it. Contacted apple who blew him off. So he contacted the guy who ran Gizmodo, and sold it to him for 5k. Gizmodo then contacted Apple who said “No that’s not a prototype it’s fake” so They did a review on it and took it apart. GIzmodo made 220k in Revenue for showing the prototype. Apple then comes out and says “Oh okay.. yes it is.. can we have it back?” and Gizmodo returned the phone to them, as long as apple promised to not raid them.

Apple agreed.

A week later, The police raided his house confiscated 4 computers and the signed agreement from apple saying that they would not go after them, and now Apple is sueing for Stealing? Are you serious? Following which, they raided the guys house who FOUND the phone in the first place? Both people which if who ATTEMPTED to return the phone to Apple, both times to be told that no no it’s not the real one.

I’m disgusted with Apple and the way that they have handled themselves. This comes after closing the platform making apps far more restrictive. Removing apps from the appstore and then blaming someone else for a company mistake?

I cannot possibly be the only person finds this ridiculously stupid. I hope Steve Jobs pulls his head out ass soon. They opened being against big brother, not being like everyone else. They made a Statement when they went public which their ad campaigns. Now you ARE Being Big Brother. You ARE another Monolithic Microsoft-cloned asshole. I was seriously considering dropping Linux and Windows entirely to go to a MAC-OS platform. But if this is how you treat people who tried to RETURN a phone that your employee is responsible for losing? You break your promise to not raid someone’s house and then turned your back on your word and did it anyway?

You’re a damn communist Steve Jobs. Considering how you treat your employees and your avid and loyal customers, which I’ve covered in detail in a different post, you’re a controlling manipulative bastard. You’ve done this once before and it caused you to lose your company the first time 20 years ago. Maybe you remember it, and maybe you’ll stop yourself before you get your ass kicked out again.

SPOILER… it’s obvious.. Buffy never loses… This video is up for a Webby Award in the mashup section. GO VOTE and support this BRILLIANT piece of Video!

The Original

The Remix

A couple of people who commented on the Remix in the webby awards illustrated a very specific point that I have unable to put into proper words. I want to quote them directly.


“The main characters in Twilight seemed to embody antiquated, sexist gender stereotypes. Edward Cullen…spies on Bella, he stalks her (for “her own good”), he sneaks into her room to watch her sleep (without her consent) and even confesses to a deep, overpowering desire to kill her…


“Before you start talking about domestic violence maybe you should read Twilight or watch the books – sure it isn’t great to encourage violence but it is certainly better than encouraging millions of young women to embrace the idea that the most perfect relationship includes threats of violence and stalking, as Edward commonly does with Bella.”

It’s one thing to write a book based around vampires, it’s another thing to make them abusive to people they are supposedly completely enraptured and in love with. Yes, Spike and Drew were abusive to each other, but that was their nature! They were vampires! Joss didn’t humanize and romanticize them! They were mean horrible, Brutal and soulless creatures! Stephanie Myers has created and romanticized the idea that being a woman and being abused is perfectly acceptable for “the perfect relationship” where he has flaws that are “enduring and charming”, and the poor man can’t control himself despite his best efforts. Shame on you Myers. Seriously.

Read the notes of the guy who created it, the answer to the question What would Buffy Do?

So as someone pointed out. We have a ton of books that are several hundred years old that give in details world of another nature, Languages and ideas that simply do not exist in our lives at the present moment. But Seriously what if it was just a Guidebook to a game of tabletop?

Meaning, If in 700 years someone came across a D&D 3rd edition rulebook, they’d probably think it was some kind of biblical guide to how we lived our lives– Or we had some kind of alien visitation that advanced our technology, then mysteriously left.

“Hark! Thine holy city is destroyed! You take 2d6 Damage!”

How much do we REALLY know about our history, and what’s to assume that we aren’t reading too much into some of the “historical artifacts” that we’ve found. For example the dead sea scrolls. What if table top was outlawed so they played it out in a cave in the middle of no where so as to avoid being caught and executed for heresy!? The scrolls themselves are nothing more than a guidebook to the most epic game of tabletop ever!? This really isn’t out of the list of possibilities, seeing that I grew up in an era where D&D was outlawed entirely by my parents – as a lot of people cited it as being demonic, or satanic. Simply because they did not understand it. People didn’t understand it 20 years ago, and they were quick to reject and classify something has bad because it gave people ideas. There was nothing wrong with it, and if nothing else it’s encouragement to enable people (and kids) to use their imagination, and *GASP* Think for themselves! For me it would have been an escape of what I would easily classify growing up in the center of hell! There is no reason to suggestion that the same reaction would not have occurred 500 or 700, or even 1,000 years ago.

I’ve gone off on this rant before about how Comics are not bad for kids, it instills and brings about critical thinking. It’s exposure to science and history, a lot of things were based off of historical fact and ideology that would only exist because someone else though it up. I don’t see how Tabletop is any different. People freak out and panic over, and quickly reject or label something as bad before they understand what it is. It’s sad too, life for me growing up would have been very different if I had access to a tabletop Group, or someone to play Magic with.

On that train of thought these are the very reasons why I’ve been teaching my boys how to play Magic the Gather and the WoW TCG. I Started with WoW TCG because it’s a name, pictures, cards and spells they are familiar with. But it will instill Critical thinking in them, give them reason to think ahead of what they are doing. Give them a place to escape to that isn’t in a prefabricated world of someone else creations. Let them create their own and push the limits of their own imagination.

Google hack was successful?

Credit goes to Wired.

Report: Google Hackers Stole Source Code of Global Password System

* By Kim Zetter Email Author
* April 20, 2010 |
* 1:06 pm |
* Categories: Breaches, Crime

The hackers who breached Google’s network last year were able to nab the source code for the company’s global password system, according to The New York Times.

The single sign-on password system, which Google referred to internally as “Gaia,” allows users to log into a constellation of services the company offers — Gmail, search, business applications and others — using one password.

The hackers, who are still unknown, were able to steal the code after gaining access to the company’s software repository, which stores the crown jewels for its search engine and other programs.

Because the hackers grabbed the software, and do not appear to have grabbed customer passwords, users aren’t directly affected by the theft. But the hackers could study the software for security vulnerabilities to devise ways to breach the system that could later affect users.

Google announced in January that it and numerous other companies had been hacked in a sophisticated attack. The hackers had targeted source code repositories at many of the companies, including Google.

According to the Times, the theft began when an instant message was sent to a Google employee in China who was using Windows Messenger. The message included a link to a malicious website. Once the employee clicked on the link, the intruders were able to gain access to the employee’s computer and from there to computers used by software developers at Google’s headquarters in California.

The intruders seemed to know the names of the Gaia software developers, according to the Times. The intruders had access to an internal Google corporate directory known as Moma, which lists the work activities of every Google employee.

They initially tried to access the programmer’s work computers and “then used a set of sophisticated techniques to gain access to the repositories where the source code for the program was stored.”

The Times doesn’t elaborate on the set of sophisticated techniques the hackers used to access the source code, but in March, security firm McAfee released a white paper in relation to the Google hack that describes serious security vulnerabilities it found in software configuration management systems (SCMs) used by companies that were targeted in the hacks.

“[The SCMs] were wide open,” Dmitri Alperovitch, McAfee’s vice president for threat research told Threat Level at the time. “No one ever thought about securing them, yet these were the crown jewels of most of these companies in many ways — much more valuable than any financial or personally identifiable data that they may have and spend so much time and effort protecting.”

Many of the companies that were attacked used the same source-code management system made by Perforce, a California-based company, according to McAfee. The paper didn’t indicate, however, whether Google used Perforce or had another system in place with vulnerabilities.

According to McAfee’s earlier report, the malicious website the hackers used in the Google hack was hosted in Taiwan. Once the victim clicked on a link to the site, the site downloaded and executed a malicious JavaScript, with a zero-day exploit that attacked a vulnerability in the user’s Internet Explorer browser.

A binary disguised as a JPEG file then downloaded to the user’s system and opened a backdoor onto the computer and set up a connection to the attackers’ command-and-control servers, also hosted in Taiwan.

From that initial access point, the attackers obtained access to the source-code management system or burrowed deeper into the corporate network to gain a persistent hold.

According to the paper, the hackers were successful at accessing source code because many SCMs are not secured out of the box and do not maintain sufficient logs to help forensic investigators examining an attack.

“Additionally, due to the open nature of most SCM systems today, much of the source code it is built to protect can be copied and managed on the endpoint developer system,” the white paper states. “It is quite common to have developers copy source code files to their local systems, edit them locally, and then check them back into the source code tree…. As a result, attackers often don’t even need to target and hack the backend SCM systems; they can simply target the individual developer systems to harvest large amounts of source code rather quickly.”

Alperovitch told Threat Level his company had seen no evidence to indicate that source code at any of the hacked companies had been altered.

Read More

Pictures of the Iceland Volcano

This if very cool, apparently with this volcano lighting erupts out of the mouth of the volcano.

Link here

Truth Spoken

Everything is amazing and nobody is happy


Shameless plug

If you are a Mythbusters fan, This is a podcast for you. They hosted Adam savage this last week. This is hilarious it’s worth listening to repeatedly. But I will give a Warning. This is not for children, this has swearing and sexual connotation. It’s made of awesome, but NOT FOR CHILDREN.

Because I have Call of Duty 4 on pause asshole.